Lucene search

K
nessusThis script is Copyright (C) 2009-2021 Tenable Network Security, Inc.AXIGEN_7_1_0.NASL
HistoryMay 27, 2009 - 12:00 a.m.

AXIGEN Webmail < 7.1.0 HTML Body Script Insertion

2009-05-2700:00:00
This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.
www.tenable.com
9

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

46.0%

The version of AXIGEN Webmail running on the remote host is earlier than 7.1.0. Such versions fail to fully sanitize text in the body of email messages. If an attacker can trick a user into opening a specially crafted message using the affected webmail application, this can be leveraged to inject malicious HTML and script code into the user’s browser, to be executed within the security context of the affected site.

#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#


include('deprecated_nasl_level.inc');
include('compat.inc');


if (description)
{
  script_id(38911);
  script_version("1.16");
  script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");

  script_cve_id("CVE-2009-1484");
  script_bugtraq_id(34716);
  script_xref(name:"Secunia", value:"34402");
  script_xref(name:"Secunia", value:"34958");

  script_name(english:"AXIGEN Webmail < 7.1.0 HTML Body Script Insertion");
  script_summary(english:"Checks AXIGEN Webmail version");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote webmail service is affected by a cross-site scripting
vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of AXIGEN Webmail running on the remote host is earlier
than 7.1.0.  Such versions fail to fully sanitize text in the body of
email messages.  If an attacker can trick a user into opening a 
specially crafted message using the affected webmail application, this
can be leveraged to inject malicious HTML and script code into
the user's browser, to be executed within the security context of the
affected site."  );
  script_set_attribute(
    attribute:"see_also", 
    value:"https://www.axigen.com/forum/forum/technical-news/1849-axigen-security-notification?t=5998"
  );
  script_set_attribute(
    attribute:"solution", 
    value:"Upgrade to AXIGEN version 7.1.0 or later."
  );
  script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_cwe_id(79);
  script_set_attribute(attribute:"plugin_publication_date", value: "2009/05/27");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:gecad:axigen_mail_server");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses : XSS");
 
  script_copyright(english:"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.");

  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 8000);

  exit(0);
}


include("global_settings.inc");
include("misc_func.inc");
include("http.inc");


port = get_http_port(default:8000, embedded:TRUE);


# Unless we're paranoid, make sure the banner is from AXIGEN's Webmail service.
if (report_paranoia < 2)
{
  banner = get_http_banner(port:port);
  if (!banner || "Server: Axigen-Webmail" >!< banner) exit(0);
}


# Get the version from the login page.
url = "/?login=";
res = http_send_recv3(method:"GET", item:url, port:port);
if (isnull(res)) exit(0);

if ("<title>AXIGEN Webmail - v" >< res[2])
{
  foreach line (split(res[2], keep:FALSE))
  {
    if ("<title>AXIGEN Webmail - v" >< line && "</title>" >< line)
    {
      version = strstr(line, "<title>AXIGEN Webmail - v") - "<title>AXIGEN Webmail - v";
      version = version - strstr(version, "</title>");

      # There's a problem if the version is before 7.1.0.
      if (version =~ "^([0-6]\.|7\.0([^0-9]|$))")
      {
        set_kb_item(name:'www/'+port+'/XSS', value:TRUE);

        if (report_verbosity > 0)
        {
          report = '\n' +
'AXIGEN Webmail version ' + version + ' appears to be running on the remote host\n' +
'based on the following title on the initial login page :\n' +
'\n  ' + line + '\n';
          security_warning(port:port, extra:report);
        }
        else security_warning(port);
      }
    }
  }
}
VendorProductVersionCPE
gecadaxigen_mail_servercpe:/a:gecad:axigen_mail_server

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

46.0%

Related for AXIGEN_7_1_0.NASL